Resubmissions

02/06/2024, 23:20

240602-3bvxlaag6v 7

02/06/2024, 23:16

240602-29dwasbg87 4

Analysis

  • max time kernel
    90s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/06/2024, 23:16

General

  • Target

    locales/bn.pak

  • Size

    911KB

  • MD5

    35f1083544e86bb85fe5860b36b743e2

  • SHA1

    27ad8b23fc03f9b26eb5125e886d18ee3798765b

  • SHA256

    28e1441c4950a90717ebd0641b1f0b4a087cbddeac39edb2618b7d24fbf5a58d

  • SHA512

    69fd40b1d1ffab122c244a7111972fa8b2d6b38c595acee8c6b650a595eb756c35f0cd774d8a7b79656258ee1dca9b6fe0a72e6bc38901804e62ffcf9976ae1c

  • SSDEEP

    3072:MtVVy6YHuQ4qxkVxCp2tUkbBb5OMDK5T0Xl+IP:GVVMH5ECAt5Bb5i5clR

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\locales\bn.pak
    1⤵
    • Modifies registry class
    PID:1768
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:376

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads